Security CaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Case returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Security
 •   Data Security
 •   Endpoint Security
 •   Application Security
 •   Security Policies
 •   Security Monitoring

Related Searches
 •   Disk Security Case
 •   Learning About Security Case
 •   License Security Case
 •   Manufacturer Security Case
 •   Methods Security Case
 •   Security Case Cycles
 •   Security Case Expert
 •   Security Case Firm
 •   Security Case Manage
 •   Security Print
Advertisement

ALL RESULTS
1 - 25 of 453 | Next Page

IT Security Case Studies by ComputerWeekly.com

June 21, 2013 - (Free Research)
Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards. 
(CASE STUDY) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 12, 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Equifax: Customer Case Study by IBM

July 22, 2013 - (Free Research)
This exclusive case study examines how a global leader in information solutions applied a comprehensive network intrusion prevention solution and was able to increase revenue through greater customer trust and improve analyst efficiency through immediate action to actionable intelligence. 
(CASE STUDY) READ ABSTRACT |

Targeted attacks: Preparation and Mitigation by SearchSecurity.com

May 17, 2013 - (Free Research)
This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy. 
(EGUIDE) READ ABSTRACT |

Building a Business Case by SearchSecurity.com

December 20, 2012 - (Free Research)
Small to midsize organizations that fail to adopt adequate mobile security measures may soon be out of business. This expert white paper outlines the business case for mobile security among SMBs; also inside, discover the key features your solution needs, and the benefits of a cloud-based approach to mobile security. 
(WHITE PAPER) READ ABSTRACT |

Client Case Study: MoneyGram International by IBM

August 02, 2011 - (Free Research)
This case study outlines the solution MoneyGram choose to help integrate their information in real-time and provide actionable insight so company managers can quickly identify questionable patterns and proactively enact new processing rules to reduce fraud. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System by FireEye

May 10, 2011 - (Free Research)
This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you. 
(CASE STUDY) READ ABSTRACT |

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System by FireEye

May 10, 2011 - (Free Research)
This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.   
(CASE STUDY) READ ABSTRACT |

Case Study: Physician Organization Secures VMware Virtualized Environment with Trend Micro Deep Security  by Trend Micro

October 26, 2009 - (Free Research)
This case study illustrates how a physicians' organization providing medical management services to 1,500 members was able to introduce Trend Micro's Deep Security solution and achieve increased security, increased flexibility, reduced costs, streamlined administration, and easy scalability. 
(CASE STUDY) READ ABSTRACT |

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam by Panda Security

November 20, 2009 - (Free Research)
Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam. 
(CASE STUDY) READ ABSTRACT |

Panda Security and Minopex - Case Study by Panda Security

July 12, 2013 - (Free Research)
Learn how a mining organization was able to integrate a cloud systems management tool into their existing security solutions to streamline audits, make diagnoses and resolve incidents wherever they are and whenever they arise. 
(CASE STUDY) READ ABSTRACT |

Case Study: Panda Security and Aloq, IT reseller by Panda Security

July 10, 2013 - (Free Research)
Read about an IT reseller organization which was able to use a cloud systems management solution in order to automate tasks and streamline IT management, saving time and ensuring a high-quality end user experience. 
(CASE STUDY) READ ABSTRACT |

Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure by HyTrust

July 01, 2011 - (Free Research)
To meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment. 
(CASE STUDY) READ ABSTRACT |

Case Study: WebEx - Securing Web Collaboration by Qualys

May 18, 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

Case Study: Bellevue School District by Websense, Inc.

November 2008 - (Free Research)
Read this case study to learn how the Bellevue School District dramatically improved their web security and productivity by extending their security policy management and administrator controls to additional IT staff members. 
(CASE STUDY) READ ABSTRACT |

RocketSpace case study by Dell Software

August 2012 - (Free Research)
In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization. 
(CASE STUDY) READ ABSTRACT |

Case Study - System One by Webroot

May 2013 - (Free Research)
This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security. 
(CASE STUDY) READ ABSTRACT |

Anittel Simplifies Managed Antivirus Service Case Study by Webroot

May 2013 - (Free Research)
This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration. 
(CASE STUDY) READ ABSTRACT |

Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Case Study: BMW by ArcSight, an HP Company

November 2009 - (Free Research)
Watch this video case study to learn how ArcSight helped BMW drastically decrease incidence response times. 
(CASE STUDY) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

Analyst Report: Case Management Automation - Facilitating Compliance by EMC Corporation

September 2010 - (Free Research)
Read this white paper to learn about the compliance implications of case-based process automaiton. 
(WHITE PAPER) READ ABSTRACT |

Software complexity, integration drive business rules automation adoption trend by IBM

November 2011 - (Free Research)
Business rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, learn how to prepare for and implement rules in case management, and where business rules and case management trends seem to be heading. 
(EGUIDE) READ ABSTRACT |

Building a Business Case for Data Governance: Ten Critical Steps by Information Builders

December 2012 - (Free Research)
This resource counts down 10 key steps that will help you build the business case for data governance in your organization. Also inside, learn about tools and tactics that will ensure your data governance project is a success. 
(WHITE PAPER) READ ABSTRACT |

Not Living Up to Expectations? Use Cases and Solutions for Common SCCM Issues by Promisec

May 2014 - (Free Research)
This informative guide outlines 5 use cases and solutions for common SCCM issues. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 453 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts